Appendix A. Deploying Effective Security Management

This appendix provides a short summary of security best practices for you to use when deploying the ASA/PIX Security Appliance in your network.

This appendix addresses the following topics:

  • Layer 2 Best Practices— Guidelines on how to mitigate network sniffing and other Layer 2 attacks in your network.

  • Authentication Best Practices— Guidelines on how to strengthen you authentication profile.

  • Perimeter Best Practices— Guidelines on how to apply access rules in your network.

  • Intrusion Prevention Best Practices— Guidelines on applying intrusion prevention software.

  • Host Intrusion Prevention Best Practices— Guidelines on effective management of host intrusion prevention.

  • VPN Best Practices— Guidelines ...

Get Securing Your Business with Cisco ASA and PIX Firewalls now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.